<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: single vsys to multi vsys setup in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268272#M74540</link>
    <description>How about sticking with one vsys and having a dedicated (new) zone for the new global protect (portal, and gateway)? I known this does not answer your question.</description>
    <pubDate>Mon, 10 Jun 2019 07:20:04 GMT</pubDate>
    <dc:creator>JoergSchuetter</dc:creator>
    <dc:date>2019-06-10T07:20:04Z</dc:date>
    <item>
      <title>single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268204#M74538</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i have a cluster setup as a single vsys&lt;/P&gt;&lt;P&gt;I want to introduce a vendor GP setup - i have some vendor that want remote access to equipement and I want to allow them that access but&amp;nbsp; &amp;nbsp;limited to just that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to get around the accidental giving them more acces than they need. so I though tsecond vsys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presume I can then just set policies just for that vsys which will have 1 public ip and probaby a internal /29 so it can connect back to the main vsys and I can assign all the rules there. makes sense to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so how hard is it to turn on multi vsys and how do you route between vsys.. do I have to go out a port and back in a port ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 00:57:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268204#M74538</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2019-06-10T00:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268272#M74540</link>
      <description>How about sticking with one vsys and having a dedicated (new) zone for the new global protect (portal, and gateway)? I known this does not answer your question.</description>
      <pubDate>Mon, 10 Jun 2019 07:20:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268272#M74540</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2019-06-10T07:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268298#M74541</link>
      <description>&lt;P&gt;I agree, adding a vsys for a simple GP setup is not necessary, it will use more resources than you need and potentially cost more as you may need to buy a vsys license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As long as you have a proper rulebase and zoning you have nothing to worry about.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 10:43:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268298#M74541</guid>
      <dc:creator>Philip_Wiberg</dc:creator>
      <dc:date>2019-06-10T10:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268313#M74543</link>
      <description>&lt;P&gt;So don't the 5220 come with vssy licensing ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My concern is I don't have a dedicated firewall team. so any mistake on the main rule set might open up 3rd parties to access all of my prod stuff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as for zones. - sound good, but when i am routing between multiple PA's the zones are as effective. alot of my rules are based around ip networks (using names and tags)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i just thought it would make my life simplier to route the GP portal and gateway traffic through to a new vsys and have it take of the VPN and apply a set of rules for vendor's and then left it through to the main vsys. which would just have a rule saying allow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm think linux style chains. be nice if I could say, if in interface is == &amp;lt;inf&amp;gt; then jump to these policy rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 12:04:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268313#M74543</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2019-06-10T12:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268343#M74544</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm a fan of the KISS principle. In this case I agree that just a zone is the better option. The only reason I would create a vsys would be if the vendor needed to co-manage the PAN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that the security policies can be very specific:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source zone = GPVPN, Source User=Vendors Users ID, Destination&amp;nbsp;zone=Vendor equipment, destination IP=Vendors equipment IP's, Applications, and make sure you scan for threats/vulnerabilities with security Profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if you have the traffic&amp;nbsp;going over multiple PAN's, routers, switches, this PAN will control everything based on the policy you set. Also make sure its high enough in the list so it takes affect prior to any other policies. Then have a policy under it where the source user has a deny all so there is nothing else they can do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 13:08:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268343#M74544</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-10T13:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268504#M74555</link>
      <description>&lt;P&gt;Yes i understand. But I diss agree with the simple zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example if my pa cluster that has my vendor GP and the new zone vendor GP. send packets destined for another location and a new cluster&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the new cluster it doesn't know about the new zone - that packet (my understanding), gets the zone if from the in interface of that cluster. The 2 things I can use are who (userid and group) and source ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a lot of my rules are based around if you come from an internal company ip you are allowed access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now I have to give the VPN an internal ip range .. so it might accidentally get extra access unless i double check all of my rules and make sure whom ever add / modified takes that into account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;having said all of that, I am sticking with the 1 vsys, I will just have to audit my rules &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 21:57:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268504#M74555</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2019-06-10T21:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: single vsys to multi vsys setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268843#M74577</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Auditing your policies is always a good idea/best practice. You can always&amp;nbsp;setup an alert when a config change is performed. I have this in case another admin makes a change so I can review it for correctness.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 16:36:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/single-vsys-to-multi-vsys-setup/m-p/268843#M74577</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-11T16:36:48Z</dc:date>
    </item>
  </channel>
</rss>

